Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption

被引:0
|
作者
Faonio, Antonio [1 ]
Hofheinz, Dennis [2 ]
Russo, Luigi [1 ]
机构
[1] EURECOM, Sophia Antipolis, France
[2] Swiss Fed Inst Technol, Zurich, Switzerland
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II | 2023年 / 13941卷
关键词
CIPHERTEXT; PROOFS;
D O I
10.1007/978-3-031-31371-4_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Re-randomizable Replayable CCA-secure public key encryption (Rand-RCCA PKE) schemes guarantee security against chosenciphertext attacks while ensuring the useful property of re-randomizable ciphertexts. We introduce the notion of multi-user and multi-ciphertext Rand-RCCAPKE and we give the first construction of such a PKE scheme with an almost tight security reduction to a standard assumption. Our construction is structure preserving and can be instantiated over Type-1 pairing groups. Technically, our work borrows ideas from the state-of-the-art Rand-RCCA PKE scheme of Faonio et al. (ASIACRYPT'19) and the adaptive partitioning technique of Hofheinz (EUROCRYPT'17). Additionally, we show (1) how to turn our scheme into a publicly verifiable (pv) Rand-RCCA scheme and (2) that plugging our pv-Rand-RCCA PKE scheme into the MixNet protocol of Faonio et al. we can obtain the first almost tightly-secure MixNet protocol.
引用
收藏
页码:275 / 305
页数:31
相关论文
共 50 条
  • [21] POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
    Hoffmann, Clement
    Libert, Benoit
    Momin, Charles
    Peters, Thomas
    Standaert, Francois-Xavier
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 114 - 144
  • [22] Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 62 - 92
  • [23] A Multi-use CCA-secure Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 39 - +
  • [24] An Improved CCA-secure Conditional Proxy Re-encryption Without Pairings
    Chang, Yanni
    He, Mingxing
    Li, Xiao
    Xing, Pengfei
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 504 - 506
  • [25] Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
    Libert, Benoit
    Joye, Marc
    Yung, Moti
    Peters, Thomas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 1 - 21
  • [26] Tightly-Secure Authenticated Key Exchange, Revisited
    Jager, Tibor
    Kiltz, Eike
    Riepel, Doreen
    Schaege, Sven
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 117 - 146
  • [27] Compact CCA-Secure Encryption for Messages of Arbitrary Length
    Abe, Masayuki
    Kiltz, Eike
    Okamoto, Tatsuaki
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 377 - +
  • [28] Tightly secure signatures and public-key encryption
    Hofheinz, Dennis
    Jager, Tibor
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) : 29 - 61
  • [29] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
  • [30] CCA-Secure Keyed-Fully Homomorphic Encryption
    Lai, Junzuo
    Deng, Robert H.
    Ma, Changshe
    Sakurai, Kouichi
    Weng, Jian
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 70 - 98